Implementation and Design of SHA-1 Algorithm

Abstract

The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA- 1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.

Authors and Affiliations

Chandra sekhar murala| Research scholar(M.Tech), Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem chandumurala@gmail.com, M. Purnasekhar| Asst. professor Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem

Keywords

Related Articles

A Study To Support First-N Queries And Incremental Updates To Answer Multi Keyword Queries

Most search engines and online search forms maintain auto completion which demonstrates suggested queries or even answers on the fly as a user types in a keyword query character by character. As many search systems a...

Intra cluster similarity of clique by positive and negative objects

Clustering of high dimensional data sets is a challenge in now a days. Finding of good clusters is a big problem for the researchers. The outlier detection of clusters and finalize about the noisy data also an import...

Haze monitoring in wireless systems using ARM7 controller

The overwhelming haze, depicted as a pall of smoke brought about boundless health problems particularly among the elderly, the youthful and children. Haze is a climatic wonder where clean, smoke and different particl...

Finite Element Analysis of Wire Drawing Process with different die contours

Finite element method is a numerical analysis tool for analyzing complex problems. It was originally developed as a tool for structural, Thermal; fluent analysis and magnetic, electrical current flow analysis but the...

Pesticide Toxicity Classification using Data Mining Techniques

Agriculture is the main occupation of our working population in India. The techniques and strategies used in agriculture since ancient times varied with many different civilizations. As time varied, the attitude towar...

Download PDF file
  • EP ID EP16355
  • DOI -
  • Views 362
  • Downloads 10

How To Cite

Chandra sekhar murala, M. Purnasekhar (2014). Implementation and Design of SHA-1 Algorithm. International Journal of Science Engineering and Advance Technology, 2(10), 612-613. https://europub.co.uk/articles/-A-16355